Vulnerabilites related to Canonical - Ubuntu Kernel
CVE-2023-32629 (GCVE-0-2023-32629)
Vulnerability from cvelistv5
Published
2023-07-26 01:59
Modified
2025-02-13 16:54
CWE
Summary
Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.941Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://ubuntu.com/security/notices/USN-6250-1"
          },
          {
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wiz.io/blog/ubuntu-overlayfs-vulnerability"
          },
          {
            "tags": [
              "issue-tracking",
              "x_transferred"
            ],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:canonical:ubantu_kernel:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ubantu_kernel",
            "vendor": "canonical",
            "versions": [
              {
                "lessThan": ".2.0-26.26",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              },
              {
                "lessThan": "6.0.0-1020.20",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              },
              {
                "lessThan": "5.4.0-155.172",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32629",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-23T14:52:16.324371Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-23T14:55:16.703Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "Linux",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu Kernel",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "6.2.0-26.26",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.0-1020.20",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.0-155.172",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Shir Tamari"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Sagi Tzadik"
        }
      ],
      "datePublic": "2023-06-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-11T18:06:23.968Z",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://ubuntu.com/security/notices/USN-6250-1"
        },
        {
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://wiz.io/blog/ubuntu-overlayfs-vulnerability"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629"
        },
        {
          "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "If not needed, disable the ability for unprivileged users\nto create namespaces. To do this temporarily, do:\n  sudo sysctl -w kernel.unprivileged_userns_clone=0\nTo disable across reboots, do:\n  echo kernel.unprivileged_userns_clone=0 | \\\n  sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2023-32629",
    "datePublished": "2023-07-26T01:59:47.061Z",
    "dateReserved": "2023-06-29T21:43:35.022Z",
    "dateUpdated": "2025-02-13T16:54:52.620Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-2640 (GCVE-0-2023-2640)
Vulnerability from cvelistv5
Published
2023-07-26 01:59
Modified
2024-10-23 14:59
CWE
Summary
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:26:09.894Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://ubuntu.com/security/notices/USN-6250-1"
          },
          {
            "tags": [
              "issue-tracking",
              "x_transferred"
            ],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wiz.io/blog/ubuntu-overlayfs-vulnerability"
          },
          {
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.ubuntu.com/archives/kernel-team/2023-July/140923.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:canonical:ubantu_kernel:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ubantu_kernel",
            "vendor": "canonical",
            "versions": [
              {
                "lessThan": "6.2.0-26.26",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              },
              {
                "lessThan": "6.0.0-1020.20",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              },
              {
                "lessThan": "5.4.0-155.172",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2640",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-23T14:57:20.015297Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-23T14:59:17.779Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "Linux",
          "platforms": [
            "Linux"
          ],
          "product": "Ubuntu Kernel",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "6.2.0-26.26",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.0-1020.20",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.0-155.172",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stonejiajia"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Shir Tamari"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Sagi Tzadik"
        }
      ],
      "datePublic": "2023-06-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On Ubuntu kernels carrying both c914c0e27eb0 and \"UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs\", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-26T01:59:23.543Z",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://ubuntu.com/security/notices/USN-6250-1"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://wiz.io/blog/ubuntu-overlayfs-vulnerability"
        },
        {
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.ubuntu.com/archives/kernel-team/2023-July/140923.html"
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "If not needed, disable the ability for unprivileged users\nto create namespaces. To do this temporarily, do:\n  sudo sysctl -w kernel.unprivileged_userns_clone=0\nTo disable across reboots, do:\n  echo kernel.unprivileged_userns_clone=0 | \\\n  sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2023-2640",
    "datePublished": "2023-07-26T01:59:23.543Z",
    "dateReserved": "2023-05-10T21:23:35.226Z",
    "dateUpdated": "2024-10-23T14:59:17.779Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}